<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Does Splunk Support ShA-256 or SHA -1? in Security</title>
    <link>https://community.splunk.com/t5/Security/Does-Splunk-Support-ShA-256-or-SHA-1/m-p/87404#M14157</link>
    <description>&lt;P&gt;Does Splunk Support ShA-256 or is it backwards compatible with SHA -1?&lt;/P&gt;</description>
    <pubDate>Mon, 08 Apr 2013 14:27:51 GMT</pubDate>
    <dc:creator>allamiro</dc:creator>
    <dc:date>2013-04-08T14:27:51Z</dc:date>
    <item>
      <title>Does Splunk Support ShA-256 or SHA -1?</title>
      <link>https://community.splunk.com/t5/Security/Does-Splunk-Support-ShA-256-or-SHA-1/m-p/87404#M14157</link>
      <description>&lt;P&gt;Does Splunk Support ShA-256 or is it backwards compatible with SHA -1?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2013 14:27:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Does-Splunk-Support-ShA-256-or-SHA-1/m-p/87404#M14157</guid>
      <dc:creator>allamiro</dc:creator>
      <dc:date>2013-04-08T14:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: Does Splunk Support ShA-256 or SHA -1?</title>
      <link>https://community.splunk.com/t5/Security/Does-Splunk-Support-ShA-256-or-SHA-1/m-p/87405#M14158</link>
      <description>&lt;P&gt;Support SHA-256/SHA-1 for what?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2013 16:59:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Does-Splunk-Support-ShA-256-or-SHA-1/m-p/87405#M14158</guid>
      <dc:creator>Ayn</dc:creator>
      <dc:date>2013-04-08T16:59:02Z</dc:date>
    </item>
    <item>
      <title>Re: Does Splunk Support ShA-256 or SHA -1?</title>
      <link>https://community.splunk.com/t5/Security/Does-Splunk-Support-ShA-256-or-SHA-1/m-p/87406#M14159</link>
      <description>&lt;P&gt;Basically. Splunk index data is encrypted as SHA-256&lt;/P&gt;

&lt;P&gt;audit.conf&lt;/P&gt;

&lt;H1&gt;EVENT HASHING: turn on SHA256 event hashing.&lt;/H1&gt;

&lt;P&gt;[eventHashing]&lt;BR /&gt;
* This stanza turns on event hashing -- every event is SHA256 hashed.&lt;BR /&gt;
* The indexer will encrypt all the signatures in a block.&lt;BR /&gt;
* Follow this stanza name with any number of the following attribute/value pairs.&lt;BR /&gt;
filters=mywhitelist,myblacklist...&lt;BR /&gt;
* (Optional) Filter which events are hashed.&lt;BR /&gt;
* Specify filtername values to apply to events.&lt;BR /&gt;
* NOTE: The order of precedence is left to right. Two special filters are provided&lt;BR /&gt;
by default:&lt;BR /&gt;
blacklist_all and whitelist_all, use them to terminate the list of your filters. For example&lt;BR /&gt;
if your list contains only whitelists, then terminating it with blacklist_all will result in&lt;BR /&gt;
signing of only events that match any of the whitelists. The default implicit filter list&lt;BR /&gt;
terminator is whitelist_all.&lt;/P&gt;

&lt;P&gt;====================================================================&lt;BR /&gt;
In Version 6.0.2, you can set SHA-256 in authentication.conf for user password.&lt;/P&gt;

&lt;P&gt;[authentication]&lt;BR /&gt;
    * Follow this stanza name with any number of the following attribute/value pairs.&lt;/P&gt;

&lt;P&gt;authType = [Splunk|LDAP|Scripted]&lt;BR /&gt;
    * Specify which authentication system to use.&lt;BR /&gt;
    * Supported values: Splunk, LDAP, Scripted.&lt;BR /&gt;
    * Defaults to Splunk.&lt;/P&gt;

&lt;P&gt;authSettings = &lt;AUTHSETTINGS-KEY&gt;,&lt;AUTHSETTINGS-KEY&gt;,...&lt;BR /&gt;
    * Key to look up the specific configurations of chosen authentication system.&lt;BR /&gt;
    * &lt;AUTHSETTINGS-KEY&gt; is the name of a stanza header that specifies attributes for an LDAP strategy &lt;BR /&gt;
      or for scripted authentication. Those stanzas are defined below.&lt;BR /&gt;
    * For LDAP, specify the LDAP strategy name(s) here. If you want Splunk to query multiple LDAP servers, &lt;BR /&gt;
      enter a comma-separated list of all strategies. Each strategy must be defined in its own stanza. The order in &lt;BR /&gt;
      which you specify the strategy names will be the order Splunk uses to query their servers when looking for a user.&lt;BR /&gt;
    * For scripted authentication, &lt;AUTHSETTINGS-KEY&gt; should be a single stanza name.&lt;/AUTHSETTINGS-KEY&gt;&lt;/AUTHSETTINGS-KEY&gt;&lt;/AUTHSETTINGS-KEY&gt;&lt;/AUTHSETTINGS-KEY&gt;&lt;/P&gt;

&lt;P&gt;passwordHashAlgorithm = [SHA512-crypt|SHA256-crypt|SHA512-crypt-&lt;NUM_ROUNDS&gt;|SHA256-crypt-&lt;NUM_ROUNDS&gt;|MD5-crypt]&lt;BR /&gt;
    * For the default "Splunk" authType, this controls how hashed passwords are stored in the $SPLUNK_HOME/etc/passwd file.&lt;BR /&gt;
    * "MD5-crypt" is an algorithm originally developed for FreeBSD in the early 1990's which became a widely used&lt;BR /&gt;
      standard among UNIX machines.  It was also used by Splunk up through the 5.0.x releases.  MD5-crypt runs the&lt;BR /&gt;
      salted password through a sequence of 1000 MD5 operations.&lt;BR /&gt;
    * "SHA256-crypt" and "SHA512-crypt" are newer versions that use 5000 rounds of the SHA256 or SHA512 hash&lt;BR /&gt;
      functions.  This is slower than MD5-crypt and therefore more resistant to dictionary attacks.  SHA512-crypt&lt;BR /&gt;
      is used for system passwords on many versions of Linux.&lt;BR /&gt;
    * These SHA-based algorithm can optionally be followed by a number of rounds to use.  For example,&lt;BR /&gt;
      "SHA512-crypt-10000" will use twice as many rounds of hashing as the default implementation.  The&lt;BR /&gt;
      number of rounds must be at least 1000.&lt;BR /&gt;
    * This setting only affects new password settings (either when a user is added or a user's password&lt;BR /&gt;
      is changed)  Existing passwords will continue to work but retain their previous hashing algorithm.&lt;BR /&gt;
    * The default is "SHA512-crypt".&lt;/NUM_ROUNDS&gt;&lt;/NUM_ROUNDS&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Sep 2020 16:05:56 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Does-Splunk-Support-ShA-256-or-SHA-1/m-p/87406#M14159</guid>
      <dc:creator>jasonchangbompa</dc:creator>
      <dc:date>2020-09-28T16:05:56Z</dc:date>
    </item>
  </channel>
</rss>

